Wednesday, 2025-02-26

*** mhen_ is now known as mhen02:59
jbernard#startmeeting cinder14:05
opendevmeetMeeting started Wed Feb 26 14:05:49 2025 UTC and is due to finish in 60 minutes.  The chair is jbernard. Information about MeetBot at http://wiki.debian.org/MeetBot.14:05
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:05
opendevmeetThe meeting name has been set to 'cinder'14:05
jbernard#topic roll call14:05
yuval0/14:05
jbernardo/14:05
whoami-rajatHi14:06
sfernandhi14:06
Saio/14:06
jbernard#link https://etherpad.opendev.org/p/cinder-epoxy-meetings14:06
akawaio/14:06
abishopo/14:06
Luzio/14:06
rosmaitao/14:06
jbernardwelcome everyone14:09
jbernard#topic annoucements14:10
jbernardff (feature freeze) is this week according to the schedule14:10
jbernard#link https://releases.openstack.org/epoxy/schedule.html14:10
jbernardthis has been quite a week so far, some kind of stomach bug thing has nearly crushed my soul :/ BUT I'm getting better finally :)14:11
whoami-rajatjbernard, good to know you are recovering14:11
jbernardmhen, Luzi: brian (rosmaita) and I owe you a review for the encryption patch14:12
rosmaitayes14:12
jbernardwhoami-rajat: thanks, i thought i might escape the winter season without any major sickness, but i was wrong! (again)14:12
whoami-rajat:/14:13
jbernardmhen, Luzi: this is on the priority list (among others) so hang in there and dont stress too much :)14:13
jbernardthere are many reviews needing feedback, if anyone has extra cycles, help in the review backlog is most appreciated14:13
msaravanHi14:14
Luzithis week is feature freeze, isn't it?14:14
jbernardmsaravan: heya14:14
jbernardmsaravan: you have a patch needing feedback14:14
jbernard#link https://review.opendev.org/c/openstack/cinder/+/94234214:14
jbernardLuzi: yes14:14
msaravansure, will do it tonight14:14
jbernardLuzi: technically :)14:14
jbernardmsaravan: sorry, this is the one related to cert based auth14:15
jbernardmsaravan: i meant you are in need of feedback14:15
jbernard^ this is a netapp patch that awaits reviews as well14:16
msaravanI verified that, and that patch looks good. 14:16
msaravanI'll update my comments again. 14:16
SaiThank you both of you for reviewing the cert based auth patch !! jbernard, msaravan 14:18
jbernardSai, msaravan: re netapp ci, those issues will be resolved soon?14:19
jbernardthat's about it, in terms of current state14:20
jbernardff is coming14:20
jbernardreviews are needed14:20
jbernardany addition feedback on the encryption patch is much appreciated14:20
jbernard#link https://review.opendev.org/c/openstack/cinder/+/92629814:21
jbernardany testing or code comments are useful14:21
jbernardill open things up14:21
jbernard#topic open discussion14:21
Saijbernard: Yes, we are on it and issues will be resolved soon. 14:21
jbernardSai: excellent14:22
yuvalif nobody have anything I can bringup a small issue14:24
jbernardyuval: sure14:25
yuvalhttps://review.opendev.org/c/openstack/os-brick/+/942689 - we use here env variable "VIRTUAL_ENV" This is special for os-brick, I wonder why and is it really needed?14:25
jbernardthe change id is14:28
jbernardChange-Id: Ib191c075ad1250822f6ac842f39214af8f3a02f014:28
yuvalgorka is around? I see he wrote it14:28
jbernardyuval: gorka left a pretty good commit message14:28
jbernardyuval: but it's possible the conditions he encouterend in 2020 are no longer present14:29
yuvalwhy the hard limit on os-brick while nova and cinder dont need to set any special env variable14:31
jbernardit looks like we need to ammend the privsep capabilities when running as non-root14:32
yuvalI meet this issue when working with kolla-ansible, insert the env variable to the kolla-docker is not trivial14:32
jbernarddoes it break without this variable set?14:32
yuvalyes - permission issues happens14:33
yuvalits depends on the backend - if you need some cap's14:33
jbernardi would consider the kolla-ansible environment, maybe there is something more accurate we can use to detect this, rather than VIRTUAL_ENV14:35
jbernardmaybe...14:35
rosmaitamaybe there is a clue in the bug? https://bugs.launchpad.net/os-brick/+bug/188405914:37
whoami-rajatso the issue Gorka saw was we needed to bypass read permissions in a virtual env, are we seeing this issue in other scenario? I'm not sure how/where kolla-ansible deploys os-brick14:37
yuvalits not doing anything special, the os-brick is deploy part of nova and cinder containers14:39
whoami-rajatand you have observed that the read permission issue happens outside of virtual env as well?14:39
yuvalI believe maybe in more past days we were more cheap on giving process cap's14:40
yuvalwhoami-rajat: yes, the process runs inside a docker14:40
yuvalmaybe thats related14:40
jbernardin general we try to elevate priveledges as little as possible, and only when absolutely needed; so perhaps this patch is slighly too narrow and needs to be revised.  14:41
whoami-rajatok, and IIUC it's the nova compute container right? does cinder-volume container also face similar permission issues while using os-brick?14:41
yuvalI saw it in nova - when attaching volume (the lightbits backend moves a file from tmp to etc/...)14:43
yuvalI am sure in cinder container I will see the same behavior14:43
whoami-rajatok, we can try creating a volume from image, which triggers similar attach/detach workflow as nova does14:44
whoami-rajatand if it succeeds, compare both container privileges14:44
whoami-rajatI'm trying to understand what happened recently that is causing this issue since the code has been there since 202014:44
yuvalits not that something was changed - so far I used special branches in kolla to add the env variable. but I really dont understand the need for this, so I am wonder if we can remove it14:45
yuvalhttps://opendev.org/openstack/cinder/src/branch/master/cinder/privsep/__init__.py14:46
yuvallooking at this14:46
yuvalalso nova is the same14:46
whoami-rajatyuval, i think that's different from what os-brick uses, i can see cinder one was implemented for cgroup throttling14:49
whoami-rajathere the sys_admin_pctxt is used https://opendev.org/openstack/cinder/src/branch/master/cinder/privsep/cgroup.py#L2614:49
whoami-rajatin os-brick, we use the "default" defined in os-brick itself https://github.com/openstack/os-brick/blob/master/os_brick/privileged/lightos.py#L2314:50
whoami-rajatand nova might have it's own usage of it's privsep context that it creates which i don't know much about14:51
yuvalis there an alternative to using the default?14:51
whoami-rajati don't see a way to configure it, we can surely elevate the privileges by adding more capabilities, the only concern i have is the reason for doing it14:53
yuvalI see this comment in the code: # It is expected that most (if not all) os-brick operations can be14:53
yuval# executed with these privileges.14:53
whoami-rajatpreviously Gorka added the read permission for a specific case i.e. virtualenv, but I'm unsure about the issue you are facing14:53
whoami-rajati think it would be good to log a bug first with the issue faced14:54
yuvalI see ok14:54
jbernardok, last call14:57
rahman-lbA very small patch related to docs https://review.opendev.org/c/openstack/cinder/+/94267214:57
jbernardrahman-lb: added to the list14:58
jbernardthank you everyone, have a good rest of the week!14:58
jbernard#endmeeting14:59
opendevmeetMeeting ended Wed Feb 26 14:59:01 2025 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)14:59
opendevmeetMinutes:        https://meetings.opendev.org/meetings/cinder/2025/cinder.2025-02-26-14.05.html14:59
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/cinder/2025/cinder.2025-02-26-14.05.txt14:59
opendevmeetLog:            https://meetings.opendev.org/meetings/cinder/2025/cinder.2025-02-26-14.05.log.html14:59
whoami-rajatthanks!15:00
*** dviroel is now known as dviroel_bbl21:31
*** jhorstmann is now known as Guest1022123:03
*** dviroel_bbl is now known as dviroel23:17

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!